First published: Wed Mar 04 2015(Updated: )
Jan Bee of the Google Security Team reports: The /usr/sbin/rhnreg_ks fails to properly validate hostnames in certificates. This can result in man in the middle attacks. Please note that this issue cannot easily be exploited to cause any significant damage to a system other then preventing registration from taking place properly which the attacker would be able to do in any event if the can man in the middle the connection.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat RHN Client Tools | ||
Red Hat Gluster Storage | =2.1 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1777 is considered to have a low severity level as it primarily affects the verification of hostnames in certificates, which can lead to potential man-in-the-middle attacks.
To resolve CVE-2015-1777, update the Red Hat rhn-client-tools to the latest version that includes a fix for hostname validation.
CVE-2015-1777 affects the Red Hat rhn-client-tools but does not affect Red Hat Enterprise Linux versions 5.0, 6.0, and 7.0 as well as Red Hat Gluster Storage version 2.1.
CVE-2015-1777 can facilitate man-in-the-middle attacks due to improper hostname validation in certificates.
CVE-2015-1777 was reported by Jan Bee from the Google Security Team.